acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Look Ma No Hands, in 140 Characters or Less...
From ACM TechNews

Look Ma No Hands, in 140 Characters or Less...

Clifford Nass, founder of Stanford University's Communications Between Humans and Interactive Media Lab, says future automobiles will boast full automation and...

Osama Bin Laden Didn't Use Encryption: 17 Documents Released
From ACM News

Osama Bin Laden Didn't Use Encryption: 17 Documents Released

It appears that Osama bin Laden didn’t encrypt any of his computer files. If he had, U.S. authorities probably wouldn’t have been able to do much after confiscating...

Steganography: How Al-Qaeda Hid Secret Documents in a Porn Video
From ACM News

Steganography: How Al-Qaeda Hid Secret Documents in a Porn Video

When a suspected al-Qaeda member was arrested in Berlin in May of 2011, he was found with a memory card with a password-protected folder—and the files within it...

Amateur Astronomers Scour the Sky For Government Secrets
From ACM News

Amateur Astronomers Scour the Sky For Government Secrets

Earlier this year Iran's defense minister put the world on notice: His nation had developed the ability to "easily" watch spacewalking astronauts from the ground...

Data Engineer in Google Case Is Identified
From ACM News

Data Engineer in Google Case Is Identified

At the center of the uproar over a Google project that scooped up personal data from potentially millions of unsuspecting people is the company software engineer...

Icann to Notify Domain Applicants of Data Breaches
From ACM TechNews

Icann to Notify Domain Applicants of Data Breaches

ICANN announced that it will notify all companies who were affected by the recent data breach in the top-level domain Applicant System that allowed other applicants...

'bullet Time' to Stop Cyber Attacks on Power Grids
From ACM News

'bullet Time' to Stop Cyber Attacks on Power Grids

In The Matrix, the famous "bullet time" effect showed how Keanu Reeves's character Neo was able to sway out of the path of incoming bullets, as time appeared to...

Americans
From ACM News

Americans

It is taking Americans a bit longer than the rest of the world to catch on to the idea of “mobile wallets.”   

Web War Ii: What a Future Cyberwar Will Look Like
From ACM News

Web War Ii: What a Future Cyberwar Will Look Like

How might the blitzkrieg of the future arrive? By air strike? An invading army? In a terrorist's suitcase? In fact it could be coming down the line to a computer...

It Engineers Ponder Fix to Dangerous Internet Routing Problem
From ACM TechNews

It Engineers Ponder Fix to Dangerous Internet Routing Problem

Information technology engineers have been studying methods for fixing a weakness in the Internet's routing system known as the Border Gateway Protocol, which can...

Iranian Oil Ministry Discovers Hackers' Target
From ACM News

Iranian Oil Ministry Discovers Hackers' Target

The Iranian oil ministry's cyber team has identified the main and hidden agenda of the recent cyber attack on the ministry, a senior Iranian official announced...

Drone ­se Takes Off on the Home Front
From ACM News

Drone ­se Takes Off on the Home Front

With little public attention, dozens of universities and law-enforcement agencies have been given approval by federal aviation regulators to use unmanned aircraft...

Could Iran Wage a Cyberwar on the ­.s.?
From ACM News

Could Iran Wage a Cyberwar on the ­.s.?

Security professionals in both the U.S. government and in private industry have long feared the prospect of a cyberwar with China or Russia, two states capable...

The World's Five Biggest Cyber Threats
From ACM News

The World's Five Biggest Cyber Threats

Criminals do not stop at stealing someone's personal data.

A Further Boost For Quantum Cryptography
From ACM TechNews

A Further Boost For Quantum Cryptography

Universidad Politecnica de Madrid researchers say they have developed an efficient information reconciliation technique for quantum key distribution that could...

Engineering a Safer World
From ACM TechNews

Engineering a Safer World

MIT professor Nancy Leveson recently hosted a workshop to educate more than 250 safety engineering professionals from around the world about System-Theoretic Accident...

Turing's Rapid Nazi Enigma Code-Breaking Secret Revealed
From ACM TechNews

Turing's Rapid Nazi Enigma Code-Breaking Secret Revealed

Two papers written by Alan Turing that detail his mathematical analysis for code breaking now can be viewed on request at Britain's National Archives.  

From ACM News

The Guardian's Open 20: Fighters For Internet Freedom

From politicians and professors to computer scientists and the first programmer, champions of the open Internet.

Researchers Work to Make Future Smart Grid Safe and Secure
From ACM TechNews

Researchers Work to Make Future Smart Grid Safe and Secure

Missouri University of Science and Technology researchers led by Bruce McMillin are using cybersecurity techniques to prevent attackers on a future power network...

Hackers Attack Iranian Oil Ministry Website, Vital Data Remains Intact
From ACM News

Hackers Attack Iranian Oil Ministry Website, Vital Data Remains Intact

A spokesman of the Iranian oil ministry confirmed a cyber attack on the ministry's data systems, but stressed that the Iranian oil industries' data has not been...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account